IT security tagged posts:

Cloud Security: An Introduction to Microsoft Azure Information Protection

Cloud Security: An Introduction to Microsoft Azure Information Protection

Microsoft Azure Information Protection is a new solution that makes it simpler to classify and protect information, even as it travels outside of your organization.

You’ll see the new options that let you define how your users can classify their ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Information Technology, Microsoft, Microsoft Mechanics, Security, Video Podcast Tags: , , , , , , ,

Oracle: Announcing the SPARC Platform

Oracle: Announcing the SPARC Platform

Highlights of John Fowler, Oracle Executive Vice President of Systems, announcing major new additions to the SPARC platform that for the first time bring the advanced security, efficiency, and simplicity of SPARC to the cloud.

For more information see: oracle.com/sparc

Share
Download Video FileWatch/download video  

Categories: Cloud Computing, Featured, HD Video, Oracle, Security, Video Podcast Tags: , , , , , , ,

IT Best Practices: The Security Poverty Line

February 10th, 2014 |
IT Best Practices: The Security Poverty Line

IT Best Practices: Imagine a security poverty line… below this line are individuals or organizations who do not have the skills, resources or funding to protect, detect and respond to cybersecurity threats. Many organizations and individuals fall below this line. ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Featured, HD Video, Intel, Intel IT, IT@Intel, Security, Video Podcast Tags: , , , , , , , ,

Inside IT: User-Centered IT

March 19th, 2013 |
Inside IT: User-Centered IT

IT Best Practices: Episode 46 – IT has developed a new partnership with its users over the past few years. Changes in technology, and the needs and demands of employees, have created new flexibility and greater choice for workers. Intel ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , ,

Inside IT: Security and Business Intelligence

March 5th, 2013 |
Inside IT: Security and Business Intelligence

IT Best Practices: Episode 45 – Intel’s approach to security has evolved. The current strategy looks to apply reasonable protections that allow information to flow through the organization. This reduces risk, but maintains a quality user experience. A big component ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Audio Podcast, Corporate, Information Technology, Inside IT, Intel, Intel IT, IT@Intel Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Strengthening Enterprise Security through Notebook Encryption

IT Best Practices: Intel chose to encrypt all corporate notebooks to keep data from being accessed if lost or stolen. Including a detailed plan for secure and cost-effective implementation, Intel IT combined a software and hardware based solution to mitigate ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , ,

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Security Solutions Enabled by Intel vPro Technology

IT Best Practices: Intel IT security specialists deployed PCs with Intel vPro technology, focusing on high-priority areas including investigations, data protection, and loss prevention and system health. Testing and validating these capabilities, Intel was able to deliver reduced manual effort ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

Enterprise IT Security Benefits of Microsoft Windows 7

December 17th, 2010 |
Enterprise IT Security Benefits of Microsoft Windows 7

IT Best Practices: Information security is a critical concern for Intel IT. New threats are continually evolving, and over time, this has forced us to invest in various security controls and mitigation strategies. As part of a three-month evaluation of ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Microsoft Tags: , , , , , , , , , , , , , , , ,

IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

November 26th, 2010 |
IT Best Practices: Maintaining IT Security while Allowing Personal Hand-Held Devices in the Enterprise

IT Best Practices: Intel IT is actively integrating employee-owned hand-held devices into our enterprise environment. With safeguards in place to protect data and intellectual property, we are allowing employees to select the tools that suit their personal work styles and ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel Tags: , , , , , , ,

IT Security in the Data Center – Intel Chip Chat – Episode 109

November 24th, 2010 |
IT Security in the Data Center – Intel Chip Chat – Episode 109

In this Intel Chip Chat audio podcast with Allyson Klein: Dylan Larson from Intel discusses the importance of data center security, the technologies that improve security from the microprocessor level and end users’ responses to the technologies.

Intel Server Room ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Intel, Intel Chip Chat Tags: , , , , , ,

Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

November 9th, 2010 |
Resetting Passwords on Encrypted Hard Drives Using Intel Active Management Technology

IT Best Practices: Matt Bodin of Intel IT demonstrates in a proof-of-concept how Intel Active Management Technology can be used to reset passwords on encrypted hard drives, saving service deck technicians significant time.

See also: IT Center Open Port

Share
Download Video FileWatch/download video  

Categories: Information Technology, Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , ,

Evaluating Thin-Client IT Security in a Changing Threat Landscape

September 19th, 2010 |
Evaluating Thin-Client IT Security in a Changing Threat Landscape

IT Client Technology: Intel IT’s security team continually analyzes our computing model to determine how it needs to evolve in response to an ever-changing threat landscape. Recent cyber-attacks on a number of high-profile targets provided added impetus to re-evaluate the ...
[see the full post]

Share
Download PDFRead/Download PDF  

Categories: Information Technology, Intel, Intel IT, IT White Papers, IT@Intel, Security Tags: , , , , , , , , , , , , , ,

Alan Ross: IT Information Security Starts At Home

July 29th, 2010 |
Alan Ross: IT Information Security Starts At Home

IT Information Security: “We cannot solve security problems with technology.” That is one of the observations of Intel IT’s Alan Ross, a Senior Principal Engineer who has developed deep insights into the data security landscape over the past decade. IT ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: Intel, Intel IT, IT@Intel, Security Tags: , , , , , , , , , , ,

Exposing the Links Between America’s Innovation Crisis, Cybersecurity, and National Security (ITSEF III full panel presentation)

Exposing the Links Between America’s Innovation Crisis, Cybersecurity, and National Security (ITSEF III full panel presentation)

This video of the panel discussion on America’s Innovation Crisis is the first public release of live, unedited conference proceedings in the three-year history of the IT Security Entrepreneurs Forum (ITSEF). ITSEF III was held at Stanford University on ...
[see the full post]

Share
Download Video FileWatch/download video  

Categories: IT Security Entrepreneurs Forum Tags: , , , , , , , , , , , , , , ,

PodTech Weekly

November 18th, 2006 |
PodTech Weekly

SAN FRANCISCO, November 18, 2006 (PodTech News) — This week saw the highly-anticipated launch of the new Sony Playstation 3. The first few buyers to get their hands on the new system waited for about 40 hours outside of the ...
[see the full post]

Share
Download Audio FileListen/download audio  

Categories: Connected Social Media, PodTech News, Technology Tags: , , ,